General
-
Target
c9fd5c6cad816fc0b00c8e1f6a830fd789c716297f9ff0fc85871750c027dc13
-
Size
415KB
-
Sample
240506-ylhb2age2t
-
MD5
c462f7ca6c7629bc6b489d028d53f0bc
-
SHA1
1db0f089f2119950b6b6b4873f73dfe9d88b9d65
-
SHA256
c9fd5c6cad816fc0b00c8e1f6a830fd789c716297f9ff0fc85871750c027dc13
-
SHA512
08f70eb6c804dcd2655c49f2a645f17a20463b8435a8244c6432b0fa3a945e05ab16081affd629dd5f8e5523031b25acb456efc23b43e7d720b9a86fa1615793
-
SSDEEP
6144:P50SXOdGHuDgJrhcqwNlpOE7oXLp3FkOfU49bCs7LrkA4:qSXOdvDIXY7O9X13FknszkA4
Static task
static1
Behavioral task
behavioral1
Sample
c9fd5c6cad816fc0b00c8e1f6a830fd789c716297f9ff0fc85871750c027dc13.exe
Resource
win10v2004-20240426-en
Malware Config
Extracted
stealc
http://185.172.128.150
-
url_path
/c698e1bc8a2f5e6d.php
Targets
-
-
Target
c9fd5c6cad816fc0b00c8e1f6a830fd789c716297f9ff0fc85871750c027dc13
-
Size
415KB
-
MD5
c462f7ca6c7629bc6b489d028d53f0bc
-
SHA1
1db0f089f2119950b6b6b4873f73dfe9d88b9d65
-
SHA256
c9fd5c6cad816fc0b00c8e1f6a830fd789c716297f9ff0fc85871750c027dc13
-
SHA512
08f70eb6c804dcd2655c49f2a645f17a20463b8435a8244c6432b0fa3a945e05ab16081affd629dd5f8e5523031b25acb456efc23b43e7d720b9a86fa1615793
-
SSDEEP
6144:P50SXOdGHuDgJrhcqwNlpOE7oXLp3FkOfU49bCs7LrkA4:qSXOdvDIXY7O9X13FknszkA4
-
Detect ZGRat V1
-
Downloads MZ/PE file
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-